• Title/Summary/Keyword: Smart Safety Management

Search Result 423, Processing Time 0.025 seconds

Development of Low-Power IoT Sensor and Cloud-Based Data Fusion Displacement Estimation Method for Ambient Bridge Monitoring (상시 교량 모니터링을 위한 저전력 IoT 센서 및 클라우드 기반 데이터 융합 변위 측정 기법 개발)

  • Park, Jun-Young;Shin, Jun-Sik;Won, Jong-Bin;Park, Jong-Woong;Park, Min-Yong
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.5
    • /
    • pp.301-308
    • /
    • 2021
  • It is important to develop a digital SOC (Social Overhead Capital) maintenance system for preemptive maintenance in response to the rapid aging of social infrastructures. Abnormal signals induced from structures can be detected quickly and optimal decisions can be made promptly using IoT sensors deployed on the structures. In this study, a digital SOC monitoring system incorporating a multimetric IoT sensor was developed for long-term monitoring, for use in cloud-computing server for automated and powerful data analysis, and for establishing databases to perform : (1) multimetric sensing, (2) long-term operation, and (3) LTE-based direct communication. The developed sensor had three axes of acceleration, and five axes of strain sensing channels for multimetric sensing, and had an event-driven power management system that activated the sensors only when vibration exceeded a predetermined limit, or the timer was triggered. The power management system could reduce power consumption, and an additional solar panel charging could enable long-term operation. Data from the sensors were transmitted to the server in real-time via low-power LTE-CAT M1 communication, which does not require an additional gateway device. Furthermore, the cloud server was developed to receive multi-variable data from the sensor, and perform a displacement fusion algorithm to obtain reference-free structural displacement for ambient structural assessment. The proposed digital SOC system was experimentally validated on a steel railroad and concrete girder bridge.

Detection of Salmonella spp. in Seafood via Desalinized DNA Extraction Method and Pre-culture (전배양과 탈염과정을 포함하는 DNA 추출법을 이용한 분자생물학적 방법으로 수산물 중 오염된 Salmonella spp.의 검출)

  • Ye-Jun Song;Kyung-Jin Cho;Eun-Ik Son;Du-Min Jo;Young-Mog Kim;Seul-Ki Park
    • Journal of Food Hygiene and Safety
    • /
    • v.38 no.3
    • /
    • pp.123-130
    • /
    • 2023
  • Salmonella spp. are prevalent foodborne pathogens that are infective at relatively low concentrations, thus posing a serious health threat, especially to young children and the elderly. In several countries, the management and regulation of Salmonella spp. in food, including seafood, adhere to a negative detection standard. The risk of infection is particularly high when seafood is consumed raw, which underscores the importance of timely detection of pathogenic microorganisms, such as Salmonella. Accordingly, this study aimed to develop a combined pre-treatment and detection method that includes pre-culture and DNA extraction in order to detect five species of Salmonella at concentrations below 10 CFU/mL in seafood. The effectiveness of the proposed method was assessed in terms of the composition of the enrichment (pre-culture) medium, minimum incubation time, and minimum cell concentration for pathogen detection. Furthermore, a practical DNA extraction method capable of effectively handling high salt conditions was tested and found to be successful. Through polymerase chain reaction, Salmonella spp. Were detected and positively identified in shellfish samples at cell concentrations below 10 CFU/g. Thus, the proposed method, combining sample pre-treatment and cell culture with DNA extraction, was shown to be an effective strategy for detecting low cellular concentrations of harmful bacteria. The proposed methodology is suitable as an economical and practical in situ pre-treatment for effective detection of Salmonella spp. in seafood.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Development and assessment of pre-release discharge technology for response to flood on deteriorated reservoirs dealing with abnormal weather events (이상기후대비 노후저수지 홍수 대응을 위한 사전방류 기술개발 및 평가)

  • Moon, Soojin;Jeong, Changsam;Choi, Byounghan;Kim, Seungwook;Jang, Daewon
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.11
    • /
    • pp.775-784
    • /
    • 2023
  • With the increasing trend of extreme rainfall that exceeds the design frequency of man-made structures due to extreme weather, it is necessary to review the safety of agricultural reservoirs designed in the past. However, there are no local government-managed reservoirs (13,685) that can be discharged in an emergency, except for reservoirs over a certain size under the jurisdiction of the Korea Rural Affairs Corporation. In this case, it is important to quickly deploy a mobile siphon to the site for preliminary discharge, and this study evaluated the applicability of a mobile siphon with a diameter of 200 mm, a minimum water level difference of 6 m, 420 (m2/h), and 10,000 (m2/day), which can perform both preliminary and emergency discharge functions, to the Yugum Reservoir in Gyeongju City. The test bed, Yugum Reservoir, is a facility that was completed in 1945 and has been in use for about 78 years. According to the hydrological stability analysis, the lowest height of the current dam crest section is 27.15 (EL.m), which is 0.29m lower than the reviewed flood level of 27.44 (EL.m), indicating that there is a possibility of lunar flow through the embankment, and the headroom is insufficient by 1.72 m, so it was reviewed as not securing hydrological safety. The water level-volume curve was arbitrarily derived because it was difficult to clearly establish the water level-flow relationship curve of the reservoir since the water level-flow measurement was not carried out regularly, and based on the derived curve, the algorithm for operating small and medium-sized old reservoirs was developed to consider the pre-discharge time, the amount of spillway discharge, and to predict the reservoir lunar flow time according to the flood volume by frequency, thereby securing evacuation time in advance and reducing the risk of collapse. Based on one row of 200 mm diameter mobile siphons, the optimal pre-discharge time to secure evacuation time (about 1 hour) while maintaining 80% of the upper limit water level (about 30,000 m2) during a 30-year flood was analyzed to be 12 hours earlier. If the pre-discharge technology utilizing siphons for small and medium-sized old reservoirs and the algorithm for reservoir operation are implemented in advance in case of abnormal weather and the decision-making of managers is supported, it is possible to secure the safety of residents in the risk area of reservoir collapse, resolve the anxiety of residents through the establishment of a support system for evacuating residents, and reduce risk factors by providing risk avoidance measures in the event of a reservoir risk situation.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Effects of Virtual Reality Images on Body Stability : Focused on Hand Stability (VR 영상이 신체 안정성에 미치는 영향 : 손 안정성을 중심으로)

  • Han, Seung Jo;Kim, Sun-Uk;Koo, Kyo-Chan;Lee, Kyun-Joo;Cho, Min-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.391-400
    • /
    • 2017
  • The purpose of this paper is to present the effect of image stimulation on body stability as a conceptual model and to investigate the effect of image stimulus(2D, VR) on body stability(hand stability) through experiments Recently, stereoscopic images such as virtual and augmented reality are combined with smart phones and exercise equipments, and the diffusion is becoming active. The possibility of a safety accident or human error is also increasing as it temporarily affects the balance of the body and hand stability after the image stimulus is removed. The conceptual model is presented based on the results of previous studies. Based on the experimental results, the conceptual model has been explained in combination with the human information processing process and cognitive resource models that take place in the brain. Twenty subjects were exposed to 2D and VR stimuli, and display fatigue was measured by cybersickness questionnaire and hand stability by hand steadiness tester. Experimental results show that VR images induce higher display fatigue and lower hand stability than 2D. In this study, it is meaningful that hand stability according to image type and display fatigue level which have not been tried yet is revealed through conceptual model and experiment.

Developing the Test Module of $Hipass^{PLUS}$ Card (하이패스플러스카드 시험 모듈 개발)

  • Lee Ki-Han;Lee Dae-Kyu;Yeo Woonsang;Lee Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.31-42
    • /
    • 2003
  • Prepaid plastic card issued by Korea Highway Company had a lot of problems in end-user usage and management. HipassPLUS Card, which is a smart card used for a prepaid electronic payment, overcomes the problems of Prepaid Plastic card. HipassPLUS Card is also designed be compatible to other cards such as public transportation card. Thus, for the safety of using the card in such environment, the functionality and the security of HipassPLUS card should be faultless. This paper developed a test module including the test method, the test checklist, and the test procedure to examine the functionality and security of the payment mechanism of HipassPLUS card. The test module contains the method and the procedure to test the standard items according to the test checklist of HipassPLUS card. The test items and the test checklist of HirassPLUS card was selected under the provision of the specification of Korea Highway Company and ISO standard. The results of evaluation on HipassPLUS card using the proposed test module indicates that 4he HipassPLUS card satisfied the criteria under the characteristics of the functionality, security, and compatibility.

  • PDF

Construction of 3D Spatial Information of Vertical Structure by Combining UAS and Terrestrial LiDAR (UAS와 지상 LiDAR 조합에 의한 수직 구조물의 3차원 공간정보 구축)

  • Kang, Joon-Oh;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.2
    • /
    • pp.57-66
    • /
    • 2019
  • Recently, as a part of the production of spatial information by smart cities, three-dimensional reproduction of structures for reverse engineering has been attracting attention. In particular, terrestrial LiDAR is mainly used for 3D reproduction of structures, and 3D reproduction research by UAS has been actively conducted. However, both technologies produce blind spots due to the shooting angle. This study deals with vertical structures. 3D model implemented through SfM-based image analysis technology using UAS and reproducibility and effectiveness of 3D models by terrestrial LiDAR-based laser scanning are examined. In addition, two 3D models are merged and reviewed to complement the blind spot. For this purpose, UAS based image is acquired for artificial rock wall, VCP and check point are set through GNSS equipment and total station, and 3D model of structure is reproduced by using SfM based image analysis technology. In addition, Through 3D LiDAR scanning, the 3D point cloud of the structure was acquired, and the accuracy of reproduction and completeness of the 3D model based on the checkpoint were compared and reviewed with the UAS-based image analysis results. In particular, accuracy and realistic reproducibility were verified through a combination of point cloud constructed from UAS and terrestrial LiDAR. The results show that UAS - based image analysis is superior in accuracy and 3D model completeness and It is confirmed that accuracy improves with the combination of two methods. As a result of this study, it is expected that UAS and terrestrial LiDAR laser scanning combination can complement and reproduce precise three-dimensional model of vertical structure, so it can be effectively used for spatial information construction, safety diagnosis and maintenance management.

MAKING AGRICULTURAL INSURANCE IN INDIA FARMER-FRIENDLY AND CLIMATE RESILIENT

  • Kumar, K. Nirmal Ravi
    • Agribusiness and Information Management
    • /
    • v.11 no.1
    • /
    • pp.27-39
    • /
    • 2019
  • Agricultural risks are exacerbated by a variety of factors ranging from climatevariability and change, frequent natural disasters, uncertainties in yields and prices, weakrural infrastructure, imperfect markets and lack of financial services including limited spanand design of risk mitigation instruments such as credit and insurance. Indian agriculture has little more than half (53%) of its area still rainfed and this makes it highly sensitive to vagaries of climate causing unstable output. Besides adverse climatic factors, there are man-made disasters such as fire, sale of spurious seeds, adulteration of pesticides and fertilizers etc., and all these severely affect farmers through loss in production and farm income, and are beyond the control of farmers. Hence, crop insurance' is considered to be the promising tool to insulate the farmers from risks faced by them and to sustain them in the agri-business. This paper critically evaluates the performance of recent crop insurance scheme viz., Pradhan Mantri Fasal Bhima Yojana (PMFBY) and its comparative performance with earlier agricultural insurance schemes implemented in the country. It is heartening that, the comparative performance of PMFBY with earlier schemes revealed that, the Government has definitely taken a leap forward in covering more number of farmers and bringing more area under crop insurance with the execution of this new scheme and on this front, it deserves the appreciation in fulfilling the objective for bringing more number of farmers under insurance cover. The use of mobile based technology, reduced number of Crop Cutting Experiments (CCEs) and smart CCEs, digitization of land record and linking them to farmers' account for faster assessment/settlement of claims are some of the steps that contributed for effective implementation of this new crop insurance scheme. However, inadequate claim payments, errors in loss/yield assessment, delayed claim payment, no direct linkage between insurance companies and farmers are the major shortcomings of this scheme. This calls for revamping the crop insurance program in India from time to time in tune with the dynamic changes in climatic factors on one hand and to provide a safety-net for farmers to mitigate losses arising from climatic shocks on the other. The future research avenues include: insuring the revenue of the farmer (Price × Yield) as in USA and more and more tenant farmers should be brought under insurance by doling out discounts for group coverage of farmers like in Philippines where 20 per cent discount in premium is given for a group of 5-10 farmers, 30 per cent for a group of 10-20 and 40 per cent for a group of >20 farmers.